How To Install Tails on Linux
In today’s digital landscape, privacy has become increasingly important for individuals concerned about surveillance, data collection, and online tracking. Tails OS (The Amnesic Incognito Live System) stands as one of the most powerful tools for those seeking anonymity and security in their computing activities. This comprehensive guide will walk you through the entire process of installing Tails on Linux, exploring its features, and properly configuring it for optimal security.
What is Tails OS?
Tails is a specialized Linux distribution designed with privacy and anonymity as its core principles. Unlike conventional operating systems that store data on your hard drive, Tails operates entirely in RAM and leaves no trace on the computer after shutdown unless explicitly configured to do so.
Key Features of Tails:
- Anonymity through Tor: All internet traffic is automatically routed through the Tor network, concealing your location and browsing activities.
- Amnesic by design: Tails leaves no digital footprints on the host computer, running entirely from RAM.
- Built-in encryption: Comes with state-of-the-art encryption tools for secure communications and file storage.
- Pre-installed privacy tools: Includes privacy-focused applications like Tor Browser, encrypted email clients, and secure messaging tools.
- Metadata anonymization: Features tools like MAT (Metadata Anonymisation Toolkit) to remove identifying information from files.
Tails has become the go-to operating system for journalists, activists, privacy advocates, and anyone requiring a high level of anonymity while conducting sensitive digital activities.
Prerequisites and Requirements
Before attempting to install Tails, ensure your system meets the necessary requirements:
Hardware Compatibility:
- Works best on most PC computers less than 10 years old
- Compatible with some older Mac computers with Intel processors
- Not compatible with: Apple M1/M2 Macs, smartphones, tablets, or Raspberry Pi
System Requirements:
- Minimum 2GB of RAM
- Intel processor (not Apple M1 or M2)
- Graphics card compatible with Linux (Nvidia and AMD Radeon cards often encounter issues)
USB Requirements:
- Minimum 8GB USB flash drive (exclusively for Tails)
- All data on this USB will be erased during installation
Time Requirements:
- Approximately 1 hour total for downloading, verification, and installation
- About 1.5GB of data to download
Before proceeding, check your hardware for compatibility issues. Some systems may experience problems, particularly with newer or specialized hardware configurations.
Before You Begin: Security Considerations
Security should be your primary concern when installing and using Tails. Here are critical considerations before starting:
Download Verification:
- Always verify the integrity of your Tails download to prevent compromised software
- Use GPG signatures to ensure the authenticity of your installation media
Environment Security:
- Perform the installation from a trusted device free from malware or spyware
- Disable any recording software (such as Windows Recall) if present
Physical Security:
- Be mindful of cameras or surveillance in your installation environment
- Consider the risks if someone finds your Tails USB stick
Network Considerations:
- Your ISP will know you’ve accessed the Tor network unless you use bridges
- Consider if this could put you at risk in your geographic location
Remember that proper verification is crucial for security. A compromised Tails installation defeats the purpose of using the system for privacy and anonymity.
Method 1: Installing Tails Using GNOME Disks
GNOME Disks provides a user-friendly graphical interface for installing Tails on Linux distributions.
Installing GNOME Disks:
If you’re using the GNOME desktop environment, GNOME Disks is typically pre-installed. For other distributions, install it using the package manager:
- Debian/Ubuntu:
sudo apt install gnome-disk-utility
- Fedora:
sudo dnf install gnome-disk-utility
- Arch Linux:
sudo pacman -S gnome-disk-utility
Step-by-Step Installation Process:
- Start GNOME Disks: Press the Super key, type “disks” and select “Disks” from the results.
- Connect Your USB Drive: Insert the USB flash drive where you want to install Tails. Remember, all data on this drive will be lost.
- Select the USB Drive: In GNOME Disks, a new drive should appear in the left pane. Click on it to select it.
- Restore Disk Image: Click on the menu button in the title bar and choose “Restore Disk Image”.
- Select the Tails Image: Click on the file selector button and choose the Tails USB image you downloaded. Ensure the image is called “tails-amd64-x.x.x.img” with an .img file extension (not .iso).
- Start the Restoration: Click the “Start Restoring” button, then confirm by clicking “Restore” in the confirmation dialog.
- Enter Administrator Password: Depending on your Linux distribution, you might need to enter your administrator password.
- Wait for Completion: The installation process will take a few minutes to complete.
- Finish Up: After installation is complete, click on the button to finish.
This method is user-friendly and recommended for most Linux users, especially those uncomfortable with command-line operations.
Method 2: Command-Line Installation with dd
For users comfortable with the command line, the dd
command provides a powerful and direct method for installing Tails.
Understanding the dd Command:
The dd
command is a powerful utility for copying and converting files, including disk images. It’s available on virtually all Linux distributions.
Safety Precautions:
- The
dd
command can permanently destroy data if used incorrectly - Double-check all device names before executing commands
- Never use the wrong output device as it will overwrite everything on that device
Step-by-Step Installation Process:
- Find Your USB Device Name: Open a terminal and use the
lsblk
command to identify your USB drive. It usually appears as something like/dev/sdb
(not/dev/sdb1
). - Execute the dd Command: Use the following command structure, replacing the placeholders with your actual values:
sudo dd if=[name of Tails Image File] of=/dev/[Name of USB drive] bs=16M oflag=direct status=progress
For example:
sudo dd if=tails-amd64-6.14.1.img of=/dev/sdb bs=16M oflag=direct status=progress
- Wait for Completion: The command will show the progress as it copies the image to your USB drive. It may take several minutes depending on your USB drive speed.
- Verify After Writing: Once complete, the command will output the total amount of data written, which should match the size of the Tails image file.
Advantages of Command-Line Installation:
- Available on all Linux distributions without additional software
- More control over the installation process
- Often faster than graphical methods
- Works in environments where a GUI is not available
This method is recommended for experienced Linux users who are comfortable with command-line operations and understand the risk of data loss if commands are entered incorrectly.
Method 3: Using Etcher (GUI Method)
Etcher provides a user-friendly graphical interface for flashing OS images to USB drives across multiple platforms.
Installing Etcher:
- For Debian/Ubuntu: Download the AppImage from the Balena Etcher website.
- Make the AppImage Executable: Open a terminal and run:
chmod +x balenaEtcher-*.AppImage
- Run Etcher: Execute the AppImage with:
./balenaEtcher-*.AppImage
Step-by-Step Installation Process:
- Open Etcher: Launch the Etcher application.
- Select Image: Click “Flash from file” and select the Tails image file (.img).
- Select Target: Click “Select target” and choose your USB drive from the list.
- Flash: Click the “Flash!” button to begin the process.
- Verification: Etcher will automatically verify the written data after flashing to ensure integrity.
- Completion: When finished, Etcher will display a success message.
Advantages of Using Etcher:
- User-friendly interface with clear visual feedback
- Automatic verification after writing
- Cross-platform compatibility (works on Linux, macOS, and Windows)
- Minimizes risk of selecting the wrong device
- Well-maintained and regularly updated
This method is ideal for beginners or users who prefer graphical interfaces over command-line operations.
Security Verification Process
Verifying the integrity of your Tails installation is crucial for ensuring you’re using a legitimate, uncompromised version.
Downloading the Tails Signing Key:
- Open a terminal and run:
wget https://tails.net/tails-signing.key
- Import the key:
gpg --import < tails-signing.key
Installing the Debian Keyring:
For Debian-based distributions, install the Debian keyring:
sudo apt install debian-keyring
Verifying the ISO File Integrity:
- Download the signature file corresponding to your Tails image.
- Verify the signature with:
gpg --verify [signature-file] [image-file]
Understanding GPG Verification Messages:
A successful verification will include a message stating “Good signature” along with the Tails signing key identifier. Warnings about the key not being certified with a trusted signature are normal and don’t indicate a problem with the verification itself.
What to Do if Verification Fails:
If verification fails, do not use the downloaded image. This could indicate tampering or corruption. Delete the files and try downloading again from the official Tails website, preferably using a different network connection.
The verification process is essential for maintaining the security integrity of your Tails installation and should never be skipped.
Booting into Tails for the First Time
After creating your Tails USB drive, the next step is booting into the Tails environment.
Changing Boot Order in BIOS/UEFI:
- Restart your computer and access the boot menu by pressing the appropriate key during startup (commonly F2, F12, or Delete).
- Select your USB drive as the boot device.
- If your system uses UEFI, you may need to disable Secure Boot and Fast Boot options in the BIOS settings.
The Tails Welcome Screen:
- When Tails starts, you’ll see the welcome screen where you can configure language and keyboard layout settings.
- For security purposes, it’s highly recommended to set an administrator password by clicking the “+” button in the “Additional Settings” section.
Understanding the Tails Desktop Environment:
After configuration, you’ll be taken to the Tails desktop environment, which resembles a standard Linux desktop with privacy-focused applications and features.
Initial Configuration Recommendations:
- Set your preferred language and region
- Configure an administrator password if you need to access advanced settings
- Familiarize yourself with the layout before connecting to the internet
If you encounter boot problems, try selecting “Tails (Troubleshooting Mode)” from the boot menu, which provides debugging information that can help identify issues.
Connecting to the Internet with Tor
Once booted into Tails, connecting to the internet securely through Tor is straightforward but requires some understanding of the process.
Accessing Wi-Fi Settings in Tails:
- Click on the network icon in the top-right corner of the screen.
- Select “Wi-Fi Not Connected” and then select “Network”.
- Choose your Wi-Fi network and enter the password when prompted.
Understanding the Tor Connection Screen:
After connecting to Wi-Fi, the Tor Connection screen will appear automatically to help you connect to the Tor network.
Options for Difficult Network Situations:
If your network restricts access to Tor:
- Consider using bridges, which can help bypass network restrictions
- Configure proxy settings if your network uses a proxy
- Use the “Configure” button to access these advanced settings
Testing Your Connection Security:
Once connected, you can verify your Tor connection is working by visiting check.torproject.org through the Tor Browser.
What to Do if Tor Cannot Connect:
- Try using bridges if your ISP blocks Tor
- Check if your network requires authentication
- Verify your system date and time are correct (important for Tor’s security certificates)
Remember that connecting to the internet is where your anonymity begins, so take the time to ensure your connection is properly configured for your security needs.
Creating Persistent Storage
While Tails is designed to leave no traces, the persistent storage feature allows you to save certain files and settings between sessions.
What is Persistent Storage in Tails:
Persistent storage is an encrypted area on your Tails USB drive where you can save files, settings, and additional software that will remain available across reboots.
Benefits of Persistent Storage:
- Save documents between sessions
- Retain encryption keys and passwords
- Configure persistent browser bookmarks
- Install additional software that remains available after reboot
- Store Tor Browser preferences and settings
Step-by-Step Setup Process:
- Boot into Tails and set an administrator password
- Select “Applications → Tails → Configure persistent volume”
- Create a secure passphrase for your persistent storage
- Select which features you want to make persistent
- Wait for the creation process to complete
- Restart Tails and enable the persistent storage at the welcome screen
Security Considerations:
- Your persistent storage is only as secure as your passphrase
- The data remains on your USB drive (not amnesic like standard Tails)
- Consider the risks if your USB drive is lost or seized
- Regularly back up critical data to other secure media
Creating persistent storage somewhat compromises the “amnesic” nature of Tails but provides practical functionality for many use cases.
Using the Tor Browser in Tails
The Tor Browser is the primary tool for anonymous web browsing in Tails.
Key Features of the Included Tor Browser:
- Built on Firefox with additional privacy modifications
- Routes all traffic through the Tor network for anonymity
- Configured to resist browser fingerprinting
- Isolates cookies and browsing data by default
- NoScript and HTTPS-Everywhere extensions pre-installed
Security Settings and Customization:
The browser offers three security levels (Standard, Safer, and Safest) that progressively disable features that could compromise security at the expense of convenience.
Best Practices for Anonymous Browsing:
- Keep the security level as high as comfortable for your browsing needs
- Avoid downloading files unless necessary
- Never use the Tor Browser for logging into accounts you’ve used outside of Tails
- Don’t install additional browser extensions that could leak information
- Be patient with slower loading times, which are a trade-off for security
The Importance of Using .onion URLs:
When available, use .onion versions of websites, which provide end-to-end encryption within the Tor network and don’t require exit nodes that could potentially be compromised.
Using the Tor Browser correctly is essential for maintaining anonymity while using Tails.
Troubleshooting Common Tails Issues
Even with careful preparation, you may encounter issues when using Tails.
Boot Problems and Solutions:
- SBAT Verification Error: This security policy violation may require a manual upgrade to a newer Tails version or disabling Secure Boot in UEFI settings.
- Boot Loop: Try booting in “Troubleshoot Mode” by pressing Tab at the boot menu and typing “troubleshoot” followed by Enter.
USB Compatibility Issues:
For GIGABYTE motherboard USB issues, try:
- Using different USB ports (USB 2 instead of USB 3)
- Enabling xHCI handoff, EHCI handoff, and IOMMU controller in BIOS
- Adding boot options:
amd_iommu=on iommu=pt
Hardware Compatibility Problems:
- If Tails reports it’s running from a non-removable device, you may need to modify boot options by removing “live-media=removable”.
- For graphics issues, try booting without “quiet” and “splash” options to see error messages.
Network Connectivity Problems:
- If you can’t connect to Tor, consider using bridges or configuring network settings manually
- Some networks may require special configuration for connecting to Tor
Performance Optimization:
- Allocate more RAM if running in a virtual machine
- Limit the number of open browser tabs and applications
- Use lighter-weight applications when possible
When troubleshooting fails, consult the official Tails documentation or community forums for more specialized assistance.
Updating Your Tails Installation
Keeping Tails updated is crucial for security.
How to Check for Updates:
Tails will automatically check for updates when connected to the internet. You’ll see a notification if updates are available.
The Update Process:
- Boot into Tails and connect to the internet
- Launch “Applications → Tails → Tails Installer”
- Select your Tails USB drive in the “Target USB” drop-down menu
- Click “Upgrade” and confirm the action
- Wait for the update to complete (this preserves your persistent storage)
Security Implications of Outdated Tails:
Running outdated Tails versions can expose you to security vulnerabilities that have been patched in newer releases, potentially compromising your anonymity and security.
For installations on internal hard drives or virtual machines, manual updates may be required following specific procedures detailed in the Tails documentation.
Best Practices for Using Tails Securely
To maximize the security benefits of Tails, follow these best practices:
Operational Security Tips:
- Don’t log into accounts that could be linked to your identity
- Don’t share personal details while using Tails
- Remove metadata from any files you share
- Don’t reuse usernames or email addresses from outside Tails
- Assume everything you do in one Tails session could be linked together
Physical Security Considerations:
- Be aware of surveillance cameras that might record your screen or keyboard
- Use privacy screens to prevent shoulder surfing
- Secure your USB drive when not in use
- Have a plan for quickly shutting down in emergency situations
When to Use Tails vs. Other Options:
Tails is ideal for:
- Accessing the internet anonymously
- Working with sensitive documents
- Secure communications
- Bypassing censorship
Tails may not be appropriate when:
- Discovery of your Tails USB could put you at greater risk
- Your computer may be compromised at the hardware/firmware level
- You’re in an environment with camera surveillance
Safe Shutdown Procedures:
Always shut down Tails properly using the shutdown option in the menu, which ensures memory is properly wiped and no data remains accessible.